Successful Campaign Search Results

Raspberry Pi: Physical Backdoor Part 1

This tutorial is one technique to use the full functionality of your Pi. The small size makes it ideal for inside hacks, but still has the capabilities of a average desktop or computer. I should mention that a tutorial that OTW has done, but I'm gonna take it a step further. OTW made a brilliant article, but only touched on the surface of the possibilities. I hope this article will both show you many the possibilities and also allow you to start causing havoc, but I'm planning on making this ...

Hack Like a Pro: How to Cover Your Tracks So You Aren't Detected

Welcome back, my greenhorn hackers! Congratulations on your successful hack that saved the world from nuclear annihilation from our little, bellicose, Twinkie-eating dictator. The rest of world may not know what you did, but I do. Good job! Now that we hacked into the malevolent dictator's computer and temporarily disabled his nuclear launch capability, we have to think about covering our tracks so that he and his minions can't track our good works back to us.

How To: Hack a PSP 3000 or 2000 with ChickHEN R2 5.03

The PSP has never had the software support that it needed to be a really commercially successful system. Since Sony blew it already, you may as well go the extra mile to make this expensive little thing you bought more useful right? This video will teach you how to hack a PSP 3000 or 2000 with firmware version 5.03. This is a complete hack, meaning that you will be able to play .iso games and everything when you are done. Get to it! This should let you unbrick your psp 3000.

How To: Play co-op story mode in SCC (St. Petersburg, Banya)

The new Splinter Cell video game has a co-op mode now, which means you don't need to play online anymore just to play against a human. You can have your best friend sitting right next to you… playing on the same Xbox 360. Forget the absurdity of playing in separate rooms, play in the same room. Splinter Cell: Conviction for the Xbox 360 is the way to go.

News: Okularion—Untethered Augmented Reality at Under $300

Last week, a new Kickstarter campaign arrived for a completely untethered, augmented reality headset for under $300 called Okularion. While at first glance, this unit looks very much like a Samsung Gear VR, one thing that sets it apart (aside from being untethered from a nearby computer) is that it does not require a smartphone. Well, that and it's an augmented reality headset as well.

How To: The Humble THQ Bundle Is Out Just in Time for Christmas—7 Games for Any Price You Want!

Over the past few years, indie game developers have gathered together to release their products in the widely popular Humble Indie Bundle, a collection that gamers can purchase for whatever price they want. It's a win-win for both. Developers get more exposure for their games, and customers get tons of games for whatever they could afford. Heck, charities even get a little piece of the pie.

How To: Build a successful fire in the snow

In this outdoors how-to video from fitclimb.com we're shown how to make a fire in the snow. The first step is to find a good flat spot, or make a flat spot yourself. Next, we look for trees with dead branches and break those dead branches off for the wood. The key here is to be organized because you'll have to carry this wood back to your camp. Next, you want to make a platform for your fire to keep it from sinking down as the snow melts. Here, we're using the bark from a dead stump for a pla...

Walkthrough Assassin's Creed: Bloodlines: Mission 5

Find Osman in the Cathedral Square to deliver Alexander's message to him in Mission 5 on the Sony PSP. Make your way to the Cathedral area, at which point the red delivery icon pops up and denotes Osman's rendezvous point. The only problem is that the area is swarming with guards and that Altair must make successful contact without being detected. Climb up the first buildings in front of you and hop across toward the icon. Silently dispatch the archer on the roof and then head around to the o...

How To: Advanced Techniques to Bypass & Defeat XSS Filters, Part 2

Cross-site scripting can be one of the easiest vulnerabilities to discover, but to be successful with this type of attack, it is essential to learn how to get past filters. In the previous guide, we explored some ways to do this, such as abusing attributes and event handlers and tricking the application into accepting unusual characters. Now, let's take a look at more techniques used to defeat filters.

SQL Injection 101: How to Avoid Detection & Bypass Defenses

It is often said that the best hackers remain unknown, and the greatest attacks are left undiscovered, but it's hard for an up-and-coming penetration tester or white hat to learn anything unless one of those factors is actually known or discovered. But the end goal here in our SQL injection lessons is to make that statement as true as possible for us when performing our hacks.